Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0 |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 2 | #include <linux/mm.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 3 | #include <linux/gfp.h> |
Joerg Roedel | e3e2881 | 2018-04-11 17:24:38 +0200 | [diff] [blame] | 4 | #include <linux/hugetlb.h> |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 5 | #include <asm/pgalloc.h> |
Jeremy Fitzhardinge | ee5aa8d | 2008-03-17 16:37:03 -0700 | [diff] [blame] | 6 | #include <asm/pgtable.h> |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 7 | #include <asm/tlb.h> |
Ingo Molnar | a1d5a86 | 2008-06-20 15:34:46 +0200 | [diff] [blame] | 8 | #include <asm/fixmap.h> |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 9 | #include <asm/mtrr.h> |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 10 | |
Kirill A. Shutemov | 94d49eb | 2018-05-18 14:30:28 +0300 | [diff] [blame] | 11 | #ifdef CONFIG_DYNAMIC_PHYSICAL_MASK |
| 12 | phys_addr_t physical_mask __ro_after_init = (1ULL << __PHYSICAL_MASK_SHIFT) - 1; |
| 13 | EXPORT_SYMBOL(physical_mask); |
| 14 | #endif |
| 15 | |
Levin, Alexander (Sasha Levin) | 75f296d | 2017-11-15 17:35:54 -0800 | [diff] [blame] | 16 | #define PGALLOC_GFP (GFP_KERNEL_ACCOUNT | __GFP_ZERO) |
Vegard Nossum | 9e73023 | 2009-02-22 11:28:25 +0100 | [diff] [blame] | 17 | |
Ian Campbell | 1431559 | 2010-02-17 10:38:10 +0000 | [diff] [blame] | 18 | #ifdef CONFIG_HIGHPTE |
| 19 | #define PGALLOC_USER_GFP __GFP_HIGHMEM |
| 20 | #else |
| 21 | #define PGALLOC_USER_GFP 0 |
| 22 | #endif |
| 23 | |
| 24 | gfp_t __userpte_alloc_gfp = PGALLOC_GFP | PGALLOC_USER_GFP; |
| 25 | |
Joel Fernandes (Google) | 4cf5892 | 2019-01-03 15:28:34 -0800 | [diff] [blame^] | 26 | pte_t *pte_alloc_one_kernel(struct mm_struct *mm) |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 27 | { |
Vladimir Davydov | 3e79ec7 | 2016-07-26 15:24:30 -0700 | [diff] [blame] | 28 | return (pte_t *)__get_free_page(PGALLOC_GFP & ~__GFP_ACCOUNT); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 29 | } |
| 30 | |
Joel Fernandes (Google) | 4cf5892 | 2019-01-03 15:28:34 -0800 | [diff] [blame^] | 31 | pgtable_t pte_alloc_one(struct mm_struct *mm) |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 32 | { |
| 33 | struct page *pte; |
| 34 | |
Ian Campbell | 1431559 | 2010-02-17 10:38:10 +0000 | [diff] [blame] | 35 | pte = alloc_pages(__userpte_alloc_gfp, 0); |
Kirill A. Shutemov | cecbd1b | 2013-11-14 14:31:47 -0800 | [diff] [blame] | 36 | if (!pte) |
| 37 | return NULL; |
| 38 | if (!pgtable_page_ctor(pte)) { |
| 39 | __free_page(pte); |
| 40 | return NULL; |
| 41 | } |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 42 | return pte; |
| 43 | } |
| 44 | |
Ian Campbell | 1431559 | 2010-02-17 10:38:10 +0000 | [diff] [blame] | 45 | static int __init setup_userpte(char *arg) |
| 46 | { |
| 47 | if (!arg) |
| 48 | return -EINVAL; |
| 49 | |
| 50 | /* |
| 51 | * "userpte=nohigh" disables allocation of user pagetables in |
| 52 | * high memory. |
| 53 | */ |
| 54 | if (strcmp(arg, "nohigh") == 0) |
| 55 | __userpte_alloc_gfp &= ~__GFP_HIGHMEM; |
| 56 | else |
| 57 | return -EINVAL; |
| 58 | return 0; |
| 59 | } |
| 60 | early_param("userpte", setup_userpte); |
| 61 | |
Benjamin Herrenschmidt | 9e1b32c | 2009-07-22 15:44:28 +1000 | [diff] [blame] | 62 | void ___pte_free_tlb(struct mmu_gather *tlb, struct page *pte) |
Jeremy Fitzhardinge | 397f687 | 2008-03-17 16:36:57 -0700 | [diff] [blame] | 63 | { |
| 64 | pgtable_page_dtor(pte); |
Jeremy Fitzhardinge | 6944a9c | 2008-03-17 16:37:01 -0700 | [diff] [blame] | 65 | paravirt_release_pte(page_to_pfn(pte)); |
Peter Zijlstra | 48a8b97 | 2018-08-22 17:30:16 +0200 | [diff] [blame] | 66 | paravirt_tlb_remove_table(tlb, pte); |
Jeremy Fitzhardinge | 397f687 | 2008-03-17 16:36:57 -0700 | [diff] [blame] | 67 | } |
| 68 | |
Kirill A. Shutemov | 9823336 | 2015-04-14 15:46:14 -0700 | [diff] [blame] | 69 | #if CONFIG_PGTABLE_LEVELS > 2 |
Benjamin Herrenschmidt | 9e1b32c | 2009-07-22 15:44:28 +1000 | [diff] [blame] | 70 | void ___pmd_free_tlb(struct mmu_gather *tlb, pmd_t *pmd) |
Jeremy Fitzhardinge | 170fdff | 2008-03-17 16:36:58 -0700 | [diff] [blame] | 71 | { |
Kirill A. Shutemov | c283610 | 2013-11-21 14:32:09 -0800 | [diff] [blame] | 72 | struct page *page = virt_to_page(pmd); |
Jeremy Fitzhardinge | 6944a9c | 2008-03-17 16:37:01 -0700 | [diff] [blame] | 73 | paravirt_release_pmd(__pa(pmd) >> PAGE_SHIFT); |
Dave Hansen | 1de14c3 | 2013-04-12 16:23:54 -0700 | [diff] [blame] | 74 | /* |
| 75 | * NOTE! For PAE, any changes to the top page-directory-pointer-table |
| 76 | * entries need a full cr3 reload to flush. |
| 77 | */ |
| 78 | #ifdef CONFIG_X86_PAE |
| 79 | tlb->need_flush_all = 1; |
| 80 | #endif |
Kirill A. Shutemov | c283610 | 2013-11-21 14:32:09 -0800 | [diff] [blame] | 81 | pgtable_pmd_page_dtor(page); |
Peter Zijlstra | 48a8b97 | 2018-08-22 17:30:16 +0200 | [diff] [blame] | 82 | paravirt_tlb_remove_table(tlb, page); |
Jeremy Fitzhardinge | 170fdff | 2008-03-17 16:36:58 -0700 | [diff] [blame] | 83 | } |
Jeremy Fitzhardinge | 5a5f8f4 | 2008-03-17 16:36:59 -0700 | [diff] [blame] | 84 | |
Kirill A. Shutemov | 9823336 | 2015-04-14 15:46:14 -0700 | [diff] [blame] | 85 | #if CONFIG_PGTABLE_LEVELS > 3 |
Benjamin Herrenschmidt | 9e1b32c | 2009-07-22 15:44:28 +1000 | [diff] [blame] | 86 | void ___pud_free_tlb(struct mmu_gather *tlb, pud_t *pud) |
Jeremy Fitzhardinge | 5a5f8f4 | 2008-03-17 16:36:59 -0700 | [diff] [blame] | 87 | { |
Jeremy Fitzhardinge | 2761fa0 | 2008-03-17 16:37:02 -0700 | [diff] [blame] | 88 | paravirt_release_pud(__pa(pud) >> PAGE_SHIFT); |
Peter Zijlstra | 48a8b97 | 2018-08-22 17:30:16 +0200 | [diff] [blame] | 89 | paravirt_tlb_remove_table(tlb, virt_to_page(pud)); |
Jeremy Fitzhardinge | 5a5f8f4 | 2008-03-17 16:36:59 -0700 | [diff] [blame] | 90 | } |
Kirill A. Shutemov | b850405 | 2017-03-30 11:07:29 +0300 | [diff] [blame] | 91 | |
| 92 | #if CONFIG_PGTABLE_LEVELS > 4 |
| 93 | void ___p4d_free_tlb(struct mmu_gather *tlb, p4d_t *p4d) |
| 94 | { |
| 95 | paravirt_release_p4d(__pa(p4d) >> PAGE_SHIFT); |
Peter Zijlstra | 48a8b97 | 2018-08-22 17:30:16 +0200 | [diff] [blame] | 96 | paravirt_tlb_remove_table(tlb, virt_to_page(p4d)); |
Kirill A. Shutemov | b850405 | 2017-03-30 11:07:29 +0300 | [diff] [blame] | 97 | } |
| 98 | #endif /* CONFIG_PGTABLE_LEVELS > 4 */ |
Kirill A. Shutemov | 9823336 | 2015-04-14 15:46:14 -0700 | [diff] [blame] | 99 | #endif /* CONFIG_PGTABLE_LEVELS > 3 */ |
| 100 | #endif /* CONFIG_PGTABLE_LEVELS > 2 */ |
Jeremy Fitzhardinge | 170fdff | 2008-03-17 16:36:58 -0700 | [diff] [blame] | 101 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 102 | static inline void pgd_list_add(pgd_t *pgd) |
| 103 | { |
| 104 | struct page *page = virt_to_page(pgd); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 105 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 106 | list_add(&page->lru, &pgd_list); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 107 | } |
| 108 | |
| 109 | static inline void pgd_list_del(pgd_t *pgd) |
| 110 | { |
| 111 | struct page *page = virt_to_page(pgd); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 112 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 113 | list_del(&page->lru); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 114 | } |
| 115 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 116 | #define UNSHARED_PTRS_PER_PGD \ |
Jeremy Fitzhardinge | 68db065 | 2008-03-17 16:37:13 -0700 | [diff] [blame] | 117 | (SHARED_KERNEL_PMD ? KERNEL_PGD_BOUNDARY : PTRS_PER_PGD) |
Kees Cook | 184d47f | 2018-10-08 16:54:34 -0700 | [diff] [blame] | 118 | #define MAX_UNSHARED_PTRS_PER_PGD \ |
| 119 | max_t(size_t, KERNEL_PGD_BOUNDARY, PTRS_PER_PGD) |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 120 | |
Jeremy Fitzhardinge | 617d34d | 2010-09-21 12:01:51 -0700 | [diff] [blame] | 121 | |
| 122 | static void pgd_set_mm(pgd_t *pgd, struct mm_struct *mm) |
| 123 | { |
Matthew Wilcox | a052f0a | 2018-06-07 17:08:57 -0700 | [diff] [blame] | 124 | virt_to_page(pgd)->pt_mm = mm; |
Jeremy Fitzhardinge | 617d34d | 2010-09-21 12:01:51 -0700 | [diff] [blame] | 125 | } |
| 126 | |
| 127 | struct mm_struct *pgd_page_get_mm(struct page *page) |
| 128 | { |
Matthew Wilcox | a052f0a | 2018-06-07 17:08:57 -0700 | [diff] [blame] | 129 | return page->pt_mm; |
Jeremy Fitzhardinge | 617d34d | 2010-09-21 12:01:51 -0700 | [diff] [blame] | 130 | } |
| 131 | |
| 132 | static void pgd_ctor(struct mm_struct *mm, pgd_t *pgd) |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 133 | { |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 134 | /* If the pgd points to a shared pagetable level (either the |
| 135 | ptes in non-PAE, or shared PMD in PAE), then just copy the |
| 136 | references from swapper_pg_dir. */ |
Kirill A. Shutemov | 9823336 | 2015-04-14 15:46:14 -0700 | [diff] [blame] | 137 | if (CONFIG_PGTABLE_LEVELS == 2 || |
| 138 | (CONFIG_PGTABLE_LEVELS == 3 && SHARED_KERNEL_PMD) || |
Kirill A. Shutemov | b850405 | 2017-03-30 11:07:29 +0300 | [diff] [blame] | 139 | CONFIG_PGTABLE_LEVELS >= 4) { |
Jeremy Fitzhardinge | 68db065 | 2008-03-17 16:37:13 -0700 | [diff] [blame] | 140 | clone_pgd_range(pgd + KERNEL_PGD_BOUNDARY, |
| 141 | swapper_pg_dir + KERNEL_PGD_BOUNDARY, |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 142 | KERNEL_PGD_PTRS); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 143 | } |
| 144 | |
| 145 | /* list required to sync kernel mapping updates */ |
Jeremy Fitzhardinge | 617d34d | 2010-09-21 12:01:51 -0700 | [diff] [blame] | 146 | if (!SHARED_KERNEL_PMD) { |
| 147 | pgd_set_mm(pgd, mm); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 148 | pgd_list_add(pgd); |
Jeremy Fitzhardinge | 617d34d | 2010-09-21 12:01:51 -0700 | [diff] [blame] | 149 | } |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 150 | } |
| 151 | |
Jan Beulich | 17b7462 | 2008-08-29 12:51:32 +0100 | [diff] [blame] | 152 | static void pgd_dtor(pgd_t *pgd) |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 153 | { |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 154 | if (SHARED_KERNEL_PMD) |
| 155 | return; |
| 156 | |
Andrea Arcangeli | a79e53d | 2011-02-16 15:45:22 -0800 | [diff] [blame] | 157 | spin_lock(&pgd_lock); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 158 | pgd_list_del(pgd); |
Andrea Arcangeli | a79e53d | 2011-02-16 15:45:22 -0800 | [diff] [blame] | 159 | spin_unlock(&pgd_lock); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 160 | } |
| 161 | |
Jeremy Fitzhardinge | 85958b4 | 2008-03-17 16:37:14 -0700 | [diff] [blame] | 162 | /* |
| 163 | * List of all pgd's needed for non-PAE so it can invalidate entries |
| 164 | * in both cached and uncached pgd's; not needed for PAE since the |
| 165 | * kernel pmd is shared. If PAE were not to share the pmd a similar |
| 166 | * tactic would be needed. This is essentially codepath-based locking |
| 167 | * against pageattr.c; it is the unique case in which a valid change |
| 168 | * of kernel pagetables can't be lazily synchronized by vmalloc faults. |
| 169 | * vmalloc faults work because attached pagetables are never freed. |
Nadia Yvette Chambers | 6d49e35 | 2012-12-06 10:39:54 +0100 | [diff] [blame] | 170 | * -- nyc |
Jeremy Fitzhardinge | 85958b4 | 2008-03-17 16:37:14 -0700 | [diff] [blame] | 171 | */ |
| 172 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 173 | #ifdef CONFIG_X86_PAE |
| 174 | /* |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 175 | * In PAE mode, we need to do a cr3 reload (=tlb flush) when |
| 176 | * updating the top-level pagetable entries to guarantee the |
| 177 | * processor notices the update. Since this is expensive, and |
| 178 | * all 4 top-level entries are used almost immediately in a |
| 179 | * new process's life, we just pre-populate them here. |
| 180 | * |
| 181 | * Also, if we're in a paravirt environment where the kernel pmd is |
| 182 | * not shared between pagetables (!SHARED_KERNEL_PMDS), we allocate |
| 183 | * and initialize the kernel pmds here. |
| 184 | */ |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 185 | #define PREALLOCATED_PMDS UNSHARED_PTRS_PER_PGD |
Kees Cook | 184d47f | 2018-10-08 16:54:34 -0700 | [diff] [blame] | 186 | #define MAX_PREALLOCATED_PMDS MAX_UNSHARED_PTRS_PER_PGD |
Ingo Molnar | 1ec1fe7 | 2008-03-19 20:30:40 +0100 | [diff] [blame] | 187 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 188 | /* |
| 189 | * We allocate separate PMDs for the kernel part of the user page-table |
| 190 | * when PTI is enabled. We need them to map the per-process LDT into the |
| 191 | * user-space page-table. |
| 192 | */ |
| 193 | #define PREALLOCATED_USER_PMDS (static_cpu_has(X86_FEATURE_PTI) ? \ |
| 194 | KERNEL_PGD_PTRS : 0) |
Kees Cook | 184d47f | 2018-10-08 16:54:34 -0700 | [diff] [blame] | 195 | #define MAX_PREALLOCATED_USER_PMDS KERNEL_PGD_PTRS |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 196 | |
Ingo Molnar | 1ec1fe7 | 2008-03-19 20:30:40 +0100 | [diff] [blame] | 197 | void pud_populate(struct mm_struct *mm, pud_t *pudp, pmd_t *pmd) |
| 198 | { |
Jeremy Fitzhardinge | 6944a9c | 2008-03-17 16:37:01 -0700 | [diff] [blame] | 199 | paravirt_alloc_pmd(mm, __pa(pmd) >> PAGE_SHIFT); |
Ingo Molnar | 1ec1fe7 | 2008-03-19 20:30:40 +0100 | [diff] [blame] | 200 | |
| 201 | /* Note: almost everything apart from _PAGE_PRESENT is |
| 202 | reserved at the pmd (PDPT) level. */ |
| 203 | set_pud(pudp, __pud(__pa(pmd) | _PAGE_PRESENT)); |
| 204 | |
| 205 | /* |
| 206 | * According to Intel App note "TLBs, Paging-Structure Caches, |
| 207 | * and Their Invalidation", April 2007, document 317080-001, |
| 208 | * section 8.1: in PAE mode we explicitly have to flush the |
| 209 | * TLB via cr3 if the top-level pgd is changed... |
| 210 | */ |
Shaohua Li | 4981d01 | 2011-03-16 11:37:29 +0800 | [diff] [blame] | 211 | flush_tlb_mm(mm); |
Ingo Molnar | 1ec1fe7 | 2008-03-19 20:30:40 +0100 | [diff] [blame] | 212 | } |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 213 | #else /* !CONFIG_X86_PAE */ |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 214 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 215 | /* No need to prepopulate any pagetable entries in non-PAE modes. */ |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 216 | #define PREALLOCATED_PMDS 0 |
Kees Cook | 184d47f | 2018-10-08 16:54:34 -0700 | [diff] [blame] | 217 | #define MAX_PREALLOCATED_PMDS 0 |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 218 | #define PREALLOCATED_USER_PMDS 0 |
Kees Cook | 184d47f | 2018-10-08 16:54:34 -0700 | [diff] [blame] | 219 | #define MAX_PREALLOCATED_USER_PMDS 0 |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 220 | #endif /* CONFIG_X86_PAE */ |
| 221 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 222 | static void free_pmds(struct mm_struct *mm, pmd_t *pmds[], int count) |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 223 | { |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 224 | int i; |
| 225 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 226 | for (i = 0; i < count; i++) |
Kirill A. Shutemov | 09ef493 | 2013-11-14 14:31:13 -0800 | [diff] [blame] | 227 | if (pmds[i]) { |
| 228 | pgtable_pmd_page_dtor(virt_to_page(pmds[i])); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 229 | free_page((unsigned long)pmds[i]); |
Kirill A. Shutemov | dc6c9a3 | 2015-02-11 15:26:50 -0800 | [diff] [blame] | 230 | mm_dec_nr_pmds(mm); |
Kirill A. Shutemov | 09ef493 | 2013-11-14 14:31:13 -0800 | [diff] [blame] | 231 | } |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 232 | } |
| 233 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 234 | static int preallocate_pmds(struct mm_struct *mm, pmd_t *pmds[], int count) |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 235 | { |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 236 | int i; |
| 237 | bool failed = false; |
Vladimir Davydov | 3e79ec7 | 2016-07-26 15:24:30 -0700 | [diff] [blame] | 238 | gfp_t gfp = PGALLOC_GFP; |
| 239 | |
| 240 | if (mm == &init_mm) |
| 241 | gfp &= ~__GFP_ACCOUNT; |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 242 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 243 | for (i = 0; i < count; i++) { |
Vladimir Davydov | 3e79ec7 | 2016-07-26 15:24:30 -0700 | [diff] [blame] | 244 | pmd_t *pmd = (pmd_t *)__get_free_page(gfp); |
Kirill A. Shutemov | 09ef493 | 2013-11-14 14:31:13 -0800 | [diff] [blame] | 245 | if (!pmd) |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 246 | failed = true; |
Kirill A. Shutemov | 09ef493 | 2013-11-14 14:31:13 -0800 | [diff] [blame] | 247 | if (pmd && !pgtable_pmd_page_ctor(virt_to_page(pmd))) { |
Al Viro | 2a46eed | 2013-11-20 22:16:36 +0000 | [diff] [blame] | 248 | free_page((unsigned long)pmd); |
Kirill A. Shutemov | 09ef493 | 2013-11-14 14:31:13 -0800 | [diff] [blame] | 249 | pmd = NULL; |
| 250 | failed = true; |
| 251 | } |
Kirill A. Shutemov | dc6c9a3 | 2015-02-11 15:26:50 -0800 | [diff] [blame] | 252 | if (pmd) |
| 253 | mm_inc_nr_pmds(mm); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 254 | pmds[i] = pmd; |
| 255 | } |
| 256 | |
| 257 | if (failed) { |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 258 | free_pmds(mm, pmds, count); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 259 | return -ENOMEM; |
| 260 | } |
| 261 | |
| 262 | return 0; |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 263 | } |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 264 | |
| 265 | /* |
| 266 | * Mop up any pmd pages which may still be attached to the pgd. |
| 267 | * Normally they will be freed by munmap/exit_mmap, but any pmd we |
| 268 | * preallocate which never got a corresponding vma will need to be |
| 269 | * freed manually. |
| 270 | */ |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 271 | static void mop_up_one_pmd(struct mm_struct *mm, pgd_t *pgdp) |
| 272 | { |
| 273 | pgd_t pgd = *pgdp; |
| 274 | |
| 275 | if (pgd_val(pgd) != 0) { |
| 276 | pmd_t *pmd = (pmd_t *)pgd_page_vaddr(pgd); |
| 277 | |
Nadav Amit | 9bc4f28 | 2018-09-02 11:14:50 -0700 | [diff] [blame] | 278 | pgd_clear(pgdp); |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 279 | |
| 280 | paravirt_release_pmd(pgd_val(pgd) >> PAGE_SHIFT); |
| 281 | pmd_free(mm, pmd); |
| 282 | mm_dec_nr_pmds(mm); |
| 283 | } |
| 284 | } |
| 285 | |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 286 | static void pgd_mop_up_pmds(struct mm_struct *mm, pgd_t *pgdp) |
| 287 | { |
| 288 | int i; |
| 289 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 290 | for (i = 0; i < PREALLOCATED_PMDS; i++) |
| 291 | mop_up_one_pmd(mm, &pgdp[i]); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 292 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 293 | #ifdef CONFIG_PAGE_TABLE_ISOLATION |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 294 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 295 | if (!static_cpu_has(X86_FEATURE_PTI)) |
| 296 | return; |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 297 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 298 | pgdp = kernel_to_user_pgdp(pgdp); |
| 299 | |
| 300 | for (i = 0; i < PREALLOCATED_USER_PMDS; i++) |
| 301 | mop_up_one_pmd(mm, &pgdp[i + KERNEL_PGD_BOUNDARY]); |
| 302 | #endif |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 303 | } |
| 304 | |
| 305 | static void pgd_prepopulate_pmd(struct mm_struct *mm, pgd_t *pgd, pmd_t *pmds[]) |
| 306 | { |
Kirill A. Shutemov | e0c4f67 | 2017-03-13 17:33:05 +0300 | [diff] [blame] | 307 | p4d_t *p4d; |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 308 | pud_t *pud; |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 309 | int i; |
| 310 | |
Jeremy Fitzhardinge | cf3e505 | 2008-08-08 13:46:07 -0700 | [diff] [blame] | 311 | if (PREALLOCATED_PMDS == 0) /* Work around gcc-3.4.x bug */ |
| 312 | return; |
| 313 | |
Kirill A. Shutemov | e0c4f67 | 2017-03-13 17:33:05 +0300 | [diff] [blame] | 314 | p4d = p4d_offset(pgd, 0); |
| 315 | pud = pud_offset(p4d, 0); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 316 | |
Wanpeng Li | 73b44ff | 2013-07-08 16:00:17 -0700 | [diff] [blame] | 317 | for (i = 0; i < PREALLOCATED_PMDS; i++, pud++) { |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 318 | pmd_t *pmd = pmds[i]; |
| 319 | |
| 320 | if (i >= KERNEL_PGD_BOUNDARY) |
| 321 | memcpy(pmd, (pmd_t *)pgd_page_vaddr(swapper_pg_dir[i]), |
| 322 | sizeof(pmd_t) * PTRS_PER_PMD); |
| 323 | |
| 324 | pud_populate(mm, pud, pmd); |
| 325 | } |
| 326 | } |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 327 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 328 | #ifdef CONFIG_PAGE_TABLE_ISOLATION |
| 329 | static void pgd_prepopulate_user_pmd(struct mm_struct *mm, |
| 330 | pgd_t *k_pgd, pmd_t *pmds[]) |
| 331 | { |
| 332 | pgd_t *s_pgd = kernel_to_user_pgdp(swapper_pg_dir); |
| 333 | pgd_t *u_pgd = kernel_to_user_pgdp(k_pgd); |
| 334 | p4d_t *u_p4d; |
| 335 | pud_t *u_pud; |
| 336 | int i; |
| 337 | |
| 338 | u_p4d = p4d_offset(u_pgd, 0); |
| 339 | u_pud = pud_offset(u_p4d, 0); |
| 340 | |
| 341 | s_pgd += KERNEL_PGD_BOUNDARY; |
| 342 | u_pud += KERNEL_PGD_BOUNDARY; |
| 343 | |
| 344 | for (i = 0; i < PREALLOCATED_USER_PMDS; i++, u_pud++, s_pgd++) { |
| 345 | pmd_t *pmd = pmds[i]; |
| 346 | |
| 347 | memcpy(pmd, (pmd_t *)pgd_page_vaddr(*s_pgd), |
| 348 | sizeof(pmd_t) * PTRS_PER_PMD); |
| 349 | |
| 350 | pud_populate(mm, u_pud, pmd); |
| 351 | } |
| 352 | |
| 353 | } |
| 354 | #else |
| 355 | static void pgd_prepopulate_user_pmd(struct mm_struct *mm, |
| 356 | pgd_t *k_pgd, pmd_t *pmds[]) |
| 357 | { |
| 358 | } |
| 359 | #endif |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 360 | /* |
| 361 | * Xen paravirt assumes pgd table should be in one page. 64 bit kernel also |
| 362 | * assumes that pgd should be in one page. |
| 363 | * |
| 364 | * But kernel with PAE paging that is not running as a Xen domain |
| 365 | * only needs to allocate 32 bytes for pgd instead of one page. |
| 366 | */ |
| 367 | #ifdef CONFIG_X86_PAE |
| 368 | |
| 369 | #include <linux/slab.h> |
| 370 | |
| 371 | #define PGD_SIZE (PTRS_PER_PGD * sizeof(pgd_t)) |
| 372 | #define PGD_ALIGN 32 |
| 373 | |
| 374 | static struct kmem_cache *pgd_cache; |
| 375 | |
| 376 | static int __init pgd_cache_init(void) |
| 377 | { |
| 378 | /* |
| 379 | * When PAE kernel is running as a Xen domain, it does not use |
| 380 | * shared kernel pmd. And this requires a whole page for pgd. |
| 381 | */ |
| 382 | if (!SHARED_KERNEL_PMD) |
| 383 | return 0; |
| 384 | |
| 385 | /* |
| 386 | * when PAE kernel is not running as a Xen domain, it uses |
| 387 | * shared kernel pmd. Shared kernel pmd does not require a whole |
| 388 | * page for pgd. We are able to just allocate a 32-byte for pgd. |
| 389 | * During boot time, we create a 32-byte slab for pgd table allocation. |
| 390 | */ |
| 391 | pgd_cache = kmem_cache_create("pgd_cache", PGD_SIZE, PGD_ALIGN, |
| 392 | SLAB_PANIC, NULL); |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 393 | return 0; |
| 394 | } |
| 395 | core_initcall(pgd_cache_init); |
| 396 | |
| 397 | static inline pgd_t *_pgd_alloc(void) |
| 398 | { |
| 399 | /* |
| 400 | * If no SHARED_KERNEL_PMD, PAE kernel is running as a Xen domain. |
| 401 | * We allocate one page for pgd. |
| 402 | */ |
| 403 | if (!SHARED_KERNEL_PMD) |
Joerg Roedel | e3238fa | 2018-07-18 11:40:54 +0200 | [diff] [blame] | 404 | return (pgd_t *)__get_free_pages(PGALLOC_GFP, |
| 405 | PGD_ALLOCATION_ORDER); |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 406 | |
| 407 | /* |
| 408 | * Now PAE kernel is not running as a Xen domain. We can allocate |
| 409 | * a 32-byte slab for pgd to save memory space. |
| 410 | */ |
| 411 | return kmem_cache_alloc(pgd_cache, PGALLOC_GFP); |
| 412 | } |
| 413 | |
| 414 | static inline void _pgd_free(pgd_t *pgd) |
| 415 | { |
| 416 | if (!SHARED_KERNEL_PMD) |
Joerg Roedel | e3238fa | 2018-07-18 11:40:54 +0200 | [diff] [blame] | 417 | free_pages((unsigned long)pgd, PGD_ALLOCATION_ORDER); |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 418 | else |
| 419 | kmem_cache_free(pgd_cache, pgd); |
| 420 | } |
| 421 | #else |
Dave Hansen | d9e9a64 | 2017-12-04 15:07:39 +0100 | [diff] [blame] | 422 | |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 423 | static inline pgd_t *_pgd_alloc(void) |
| 424 | { |
Dave Hansen | d9e9a64 | 2017-12-04 15:07:39 +0100 | [diff] [blame] | 425 | return (pgd_t *)__get_free_pages(PGALLOC_GFP, PGD_ALLOCATION_ORDER); |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 426 | } |
| 427 | |
| 428 | static inline void _pgd_free(pgd_t *pgd) |
| 429 | { |
Dave Hansen | d9e9a64 | 2017-12-04 15:07:39 +0100 | [diff] [blame] | 430 | free_pages((unsigned long)pgd, PGD_ALLOCATION_ORDER); |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 431 | } |
| 432 | #endif /* CONFIG_X86_PAE */ |
| 433 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 434 | pgd_t *pgd_alloc(struct mm_struct *mm) |
| 435 | { |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 436 | pgd_t *pgd; |
Kees Cook | 184d47f | 2018-10-08 16:54:34 -0700 | [diff] [blame] | 437 | pmd_t *u_pmds[MAX_PREALLOCATED_USER_PMDS]; |
| 438 | pmd_t *pmds[MAX_PREALLOCATED_PMDS]; |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 439 | |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 440 | pgd = _pgd_alloc(); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 441 | |
| 442 | if (pgd == NULL) |
| 443 | goto out; |
| 444 | |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 445 | mm->pgd = pgd; |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 446 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 447 | if (preallocate_pmds(mm, pmds, PREALLOCATED_PMDS) != 0) |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 448 | goto out_free_pgd; |
| 449 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 450 | if (preallocate_pmds(mm, u_pmds, PREALLOCATED_USER_PMDS) != 0) |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 451 | goto out_free_pmds; |
| 452 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 453 | if (paravirt_pgd_alloc(mm) != 0) |
| 454 | goto out_free_user_pmds; |
| 455 | |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 456 | /* |
| 457 | * Make sure that pre-populating the pmds is atomic with |
| 458 | * respect to anything walking the pgd_list, so that they |
| 459 | * never see a partially populated pgd. |
| 460 | */ |
Andrea Arcangeli | a79e53d | 2011-02-16 15:45:22 -0800 | [diff] [blame] | 461 | spin_lock(&pgd_lock); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 462 | |
Jeremy Fitzhardinge | 617d34d | 2010-09-21 12:01:51 -0700 | [diff] [blame] | 463 | pgd_ctor(mm, pgd); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 464 | pgd_prepopulate_pmd(mm, pgd, pmds); |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 465 | pgd_prepopulate_user_pmd(mm, pgd, u_pmds); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 466 | |
Andrea Arcangeli | a79e53d | 2011-02-16 15:45:22 -0800 | [diff] [blame] | 467 | spin_unlock(&pgd_lock); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 468 | |
| 469 | return pgd; |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 470 | |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 471 | out_free_user_pmds: |
| 472 | free_pmds(mm, u_pmds, PREALLOCATED_USER_PMDS); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 473 | out_free_pmds: |
Joerg Roedel | f59dbe9 | 2018-07-18 11:41:09 +0200 | [diff] [blame] | 474 | free_pmds(mm, pmds, PREALLOCATED_PMDS); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 475 | out_free_pgd: |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 476 | _pgd_free(pgd); |
Jeremy Fitzhardinge | d8d5900 | 2008-06-25 00:19:13 -0400 | [diff] [blame] | 477 | out: |
| 478 | return NULL; |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 479 | } |
| 480 | |
| 481 | void pgd_free(struct mm_struct *mm, pgd_t *pgd) |
| 482 | { |
| 483 | pgd_mop_up_pmds(mm, pgd); |
| 484 | pgd_dtor(pgd); |
Jeremy Fitzhardinge | eba0045 | 2008-06-25 00:19:12 -0400 | [diff] [blame] | 485 | paravirt_pgd_free(mm, pgd); |
Fenghua Yu | 1db491f | 2015-01-15 20:30:01 -0800 | [diff] [blame] | 486 | _pgd_free(pgd); |
Jeremy Fitzhardinge | 4f76cd3 | 2008-03-17 16:36:55 -0700 | [diff] [blame] | 487 | } |
Jeremy Fitzhardinge | ee5aa8d | 2008-03-17 16:37:03 -0700 | [diff] [blame] | 488 | |
Rik van Riel | 0f9a921 | 2012-11-06 09:54:47 +0000 | [diff] [blame] | 489 | /* |
| 490 | * Used to set accessed or dirty bits in the page table entries |
| 491 | * on other architectures. On x86, the accessed and dirty bits |
| 492 | * are tracked by hardware. However, do_wp_page calls this function |
| 493 | * to also make the pte writeable at the same time the dirty bit is |
| 494 | * set. In that case we do actually need to write the PTE. |
| 495 | */ |
Jeremy Fitzhardinge | ee5aa8d | 2008-03-17 16:37:03 -0700 | [diff] [blame] | 496 | int ptep_set_access_flags(struct vm_area_struct *vma, |
| 497 | unsigned long address, pte_t *ptep, |
| 498 | pte_t entry, int dirty) |
| 499 | { |
| 500 | int changed = !pte_same(*ptep, entry); |
| 501 | |
Juergen Gross | 8793001 | 2017-09-04 12:25:27 +0200 | [diff] [blame] | 502 | if (changed && dirty) |
Nadav Amit | 9bc4f28 | 2018-09-02 11:14:50 -0700 | [diff] [blame] | 503 | set_pte(ptep, entry); |
Jeremy Fitzhardinge | ee5aa8d | 2008-03-17 16:37:03 -0700 | [diff] [blame] | 504 | |
| 505 | return changed; |
| 506 | } |
Jeremy Fitzhardinge | f9fbf1a | 2008-03-17 16:37:04 -0700 | [diff] [blame] | 507 | |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 508 | #ifdef CONFIG_TRANSPARENT_HUGEPAGE |
| 509 | int pmdp_set_access_flags(struct vm_area_struct *vma, |
| 510 | unsigned long address, pmd_t *pmdp, |
| 511 | pmd_t entry, int dirty) |
| 512 | { |
| 513 | int changed = !pmd_same(*pmdp, entry); |
| 514 | |
| 515 | VM_BUG_ON(address & ~HPAGE_PMD_MASK); |
| 516 | |
| 517 | if (changed && dirty) { |
Nadav Amit | 9bc4f28 | 2018-09-02 11:14:50 -0700 | [diff] [blame] | 518 | set_pmd(pmdp, entry); |
Ingo Molnar | 5e4bf1a | 2012-11-20 13:02:51 +0100 | [diff] [blame] | 519 | /* |
| 520 | * We had a write-protection fault here and changed the pmd |
| 521 | * to to more permissive. No need to flush the TLB for that, |
| 522 | * #PF is architecturally guaranteed to do that and in the |
| 523 | * worst-case we'll generate a spurious fault. |
| 524 | */ |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 525 | } |
| 526 | |
| 527 | return changed; |
| 528 | } |
Matthew Wilcox | a00cc7d | 2017-02-24 14:57:02 -0800 | [diff] [blame] | 529 | |
| 530 | int pudp_set_access_flags(struct vm_area_struct *vma, unsigned long address, |
| 531 | pud_t *pudp, pud_t entry, int dirty) |
| 532 | { |
| 533 | int changed = !pud_same(*pudp, entry); |
| 534 | |
| 535 | VM_BUG_ON(address & ~HPAGE_PUD_MASK); |
| 536 | |
| 537 | if (changed && dirty) { |
Nadav Amit | 9bc4f28 | 2018-09-02 11:14:50 -0700 | [diff] [blame] | 538 | set_pud(pudp, entry); |
Matthew Wilcox | a00cc7d | 2017-02-24 14:57:02 -0800 | [diff] [blame] | 539 | /* |
| 540 | * We had a write-protection fault here and changed the pud |
| 541 | * to to more permissive. No need to flush the TLB for that, |
| 542 | * #PF is architecturally guaranteed to do that and in the |
| 543 | * worst-case we'll generate a spurious fault. |
| 544 | */ |
| 545 | } |
| 546 | |
| 547 | return changed; |
| 548 | } |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 549 | #endif |
| 550 | |
Jeremy Fitzhardinge | f9fbf1a | 2008-03-17 16:37:04 -0700 | [diff] [blame] | 551 | int ptep_test_and_clear_young(struct vm_area_struct *vma, |
| 552 | unsigned long addr, pte_t *ptep) |
| 553 | { |
| 554 | int ret = 0; |
| 555 | |
| 556 | if (pte_young(*ptep)) |
| 557 | ret = test_and_clear_bit(_PAGE_BIT_ACCESSED, |
Thomas Gleixner | 48e2395 | 2008-05-24 17:24:34 +0200 | [diff] [blame] | 558 | (unsigned long *) &ptep->pte); |
Jeremy Fitzhardinge | f9fbf1a | 2008-03-17 16:37:04 -0700 | [diff] [blame] | 559 | |
Jeremy Fitzhardinge | f9fbf1a | 2008-03-17 16:37:04 -0700 | [diff] [blame] | 560 | return ret; |
| 561 | } |
Jeremy Fitzhardinge | c20311e | 2008-03-17 16:37:05 -0700 | [diff] [blame] | 562 | |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 563 | #ifdef CONFIG_TRANSPARENT_HUGEPAGE |
| 564 | int pmdp_test_and_clear_young(struct vm_area_struct *vma, |
| 565 | unsigned long addr, pmd_t *pmdp) |
| 566 | { |
| 567 | int ret = 0; |
| 568 | |
| 569 | if (pmd_young(*pmdp)) |
| 570 | ret = test_and_clear_bit(_PAGE_BIT_ACCESSED, |
Johannes Weiner | f2d6bfe | 2011-01-13 15:47:01 -0800 | [diff] [blame] | 571 | (unsigned long *)pmdp); |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 572 | |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 573 | return ret; |
| 574 | } |
Matthew Wilcox | a00cc7d | 2017-02-24 14:57:02 -0800 | [diff] [blame] | 575 | int pudp_test_and_clear_young(struct vm_area_struct *vma, |
| 576 | unsigned long addr, pud_t *pudp) |
| 577 | { |
| 578 | int ret = 0; |
| 579 | |
| 580 | if (pud_young(*pudp)) |
| 581 | ret = test_and_clear_bit(_PAGE_BIT_ACCESSED, |
| 582 | (unsigned long *)pudp); |
| 583 | |
| 584 | return ret; |
| 585 | } |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 586 | #endif |
| 587 | |
Jeremy Fitzhardinge | c20311e | 2008-03-17 16:37:05 -0700 | [diff] [blame] | 588 | int ptep_clear_flush_young(struct vm_area_struct *vma, |
| 589 | unsigned long address, pte_t *ptep) |
| 590 | { |
Shaohua Li | b13b1d2 | 2014-04-08 15:58:09 +0800 | [diff] [blame] | 591 | /* |
| 592 | * On x86 CPUs, clearing the accessed bit without a TLB flush |
| 593 | * doesn't cause data corruption. [ It could cause incorrect |
| 594 | * page aging and the (mistaken) reclaim of hot pages, but the |
| 595 | * chance of that should be relatively low. ] |
| 596 | * |
| 597 | * So as a performance optimization don't flush the TLB when |
| 598 | * clearing the accessed bit, it will eventually be flushed by |
| 599 | * a context switch or a VM operation anyway. [ In the rare |
| 600 | * event of it not getting flushed for a long time the delay |
| 601 | * shouldn't really matter because there's no real memory |
| 602 | * pressure for swapout to react to. ] |
| 603 | */ |
| 604 | return ptep_test_and_clear_young(vma, address, ptep); |
Jeremy Fitzhardinge | c20311e | 2008-03-17 16:37:05 -0700 | [diff] [blame] | 605 | } |
Jeremy Fitzhardinge | 7c7e6e0 | 2008-06-17 11:41:54 -0700 | [diff] [blame] | 606 | |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 607 | #ifdef CONFIG_TRANSPARENT_HUGEPAGE |
| 608 | int pmdp_clear_flush_young(struct vm_area_struct *vma, |
| 609 | unsigned long address, pmd_t *pmdp) |
| 610 | { |
| 611 | int young; |
| 612 | |
| 613 | VM_BUG_ON(address & ~HPAGE_PMD_MASK); |
| 614 | |
| 615 | young = pmdp_test_and_clear_young(vma, address, pmdp); |
| 616 | if (young) |
| 617 | flush_tlb_range(vma, address, address + HPAGE_PMD_SIZE); |
| 618 | |
| 619 | return young; |
| 620 | } |
Andrea Arcangeli | db3eb96f | 2011-01-13 15:46:41 -0800 | [diff] [blame] | 621 | #endif |
| 622 | |
Gustavo F. Padovan | fd862dd | 2009-02-15 21:48:54 -0300 | [diff] [blame] | 623 | /** |
| 624 | * reserve_top_address - reserves a hole in the top of kernel address space |
| 625 | * @reserve - size of hole to reserve |
| 626 | * |
| 627 | * Can be used to relocate the fixmap area and poke a hole in the top |
| 628 | * of kernel address space to make room for a hypervisor. |
| 629 | */ |
| 630 | void __init reserve_top_address(unsigned long reserve) |
| 631 | { |
| 632 | #ifdef CONFIG_X86_32 |
| 633 | BUG_ON(fixmaps_set > 0); |
Andy Lutomirski | 73159fd | 2014-05-05 12:19:31 -0700 | [diff] [blame] | 634 | __FIXADDR_TOP = round_down(-reserve, 1 << PMD_SHIFT) - PAGE_SIZE; |
| 635 | printk(KERN_INFO "Reserving virtual address space above 0x%08lx (rounded to 0x%08lx)\n", |
| 636 | -reserve, __FIXADDR_TOP + PAGE_SIZE); |
Gustavo F. Padovan | fd862dd | 2009-02-15 21:48:54 -0300 | [diff] [blame] | 637 | #endif |
| 638 | } |
| 639 | |
Jeremy Fitzhardinge | 7c7e6e0 | 2008-06-17 11:41:54 -0700 | [diff] [blame] | 640 | int fixmaps_set; |
| 641 | |
Jeremy Fitzhardinge | aeaaa59 | 2008-06-17 11:42:01 -0700 | [diff] [blame] | 642 | void __native_set_fixmap(enum fixed_addresses idx, pte_t pte) |
Jeremy Fitzhardinge | 7c7e6e0 | 2008-06-17 11:41:54 -0700 | [diff] [blame] | 643 | { |
| 644 | unsigned long address = __fix_to_virt(idx); |
| 645 | |
Feng Tang | 05ab1d8 | 2018-09-20 10:58:28 +0800 | [diff] [blame] | 646 | #ifdef CONFIG_X86_64 |
| 647 | /* |
| 648 | * Ensure that the static initial page tables are covering the |
| 649 | * fixmap completely. |
| 650 | */ |
| 651 | BUILD_BUG_ON(__end_of_permanent_fixed_addresses > |
| 652 | (FIXMAP_PMD_NUM * PTRS_PER_PTE)); |
| 653 | #endif |
| 654 | |
Jeremy Fitzhardinge | 7c7e6e0 | 2008-06-17 11:41:54 -0700 | [diff] [blame] | 655 | if (idx >= __end_of_fixed_addresses) { |
| 656 | BUG(); |
| 657 | return; |
| 658 | } |
Jeremy Fitzhardinge | aeaaa59 | 2008-06-17 11:42:01 -0700 | [diff] [blame] | 659 | set_pte_vaddr(address, pte); |
Jeremy Fitzhardinge | 7c7e6e0 | 2008-06-17 11:41:54 -0700 | [diff] [blame] | 660 | fixmaps_set++; |
| 661 | } |
Jeremy Fitzhardinge | aeaaa59 | 2008-06-17 11:42:01 -0700 | [diff] [blame] | 662 | |
Masami Hiramatsu | 3b3809a | 2009-04-09 10:55:33 -0700 | [diff] [blame] | 663 | void native_set_fixmap(enum fixed_addresses idx, phys_addr_t phys, |
| 664 | pgprot_t flags) |
Jeremy Fitzhardinge | aeaaa59 | 2008-06-17 11:42:01 -0700 | [diff] [blame] | 665 | { |
Dave Hansen | fb43d6c | 2018-04-06 13:55:09 -0700 | [diff] [blame] | 666 | /* Sanitize 'prot' against any unsupported bits: */ |
| 667 | pgprot_val(flags) &= __default_kernel_pte_mask; |
| 668 | |
Jeremy Fitzhardinge | aeaaa59 | 2008-06-17 11:42:01 -0700 | [diff] [blame] | 669 | __native_set_fixmap(idx, pfn_pte(phys >> PAGE_SHIFT, flags)); |
| 670 | } |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 671 | |
| 672 | #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP |
Kirill A. Shutemov | b850405 | 2017-03-30 11:07:29 +0300 | [diff] [blame] | 673 | #ifdef CONFIG_X86_5LEVEL |
| 674 | /** |
| 675 | * p4d_set_huge - setup kernel P4D mapping |
| 676 | * |
| 677 | * No 512GB pages yet -- always return 0 |
| 678 | */ |
| 679 | int p4d_set_huge(p4d_t *p4d, phys_addr_t addr, pgprot_t prot) |
| 680 | { |
| 681 | return 0; |
| 682 | } |
| 683 | |
| 684 | /** |
| 685 | * p4d_clear_huge - clear kernel P4D mapping when it is set |
| 686 | * |
| 687 | * No 512GB pages yet -- always return 0 |
| 688 | */ |
| 689 | int p4d_clear_huge(p4d_t *p4d) |
| 690 | { |
| 691 | return 0; |
| 692 | } |
| 693 | #endif |
| 694 | |
Toshi Kani | 3d3ca41 | 2015-05-26 10:28:07 +0200 | [diff] [blame] | 695 | /** |
| 696 | * pud_set_huge - setup kernel PUD mapping |
| 697 | * |
Toshi Kani | b73522e | 2015-05-26 10:28:10 +0200 | [diff] [blame] | 698 | * MTRRs can override PAT memory types with 4KiB granularity. Therefore, this |
| 699 | * function sets up a huge page only if any of the following conditions are met: |
| 700 | * |
| 701 | * - MTRRs are disabled, or |
| 702 | * |
| 703 | * - MTRRs are enabled and the range is completely covered by a single MTRR, or |
| 704 | * |
| 705 | * - MTRRs are enabled and the corresponding MTRR memory type is WB, which |
| 706 | * has no effect on the requested PAT memory type. |
| 707 | * |
| 708 | * Callers should try to decrease page size (1GB -> 2MB -> 4K) if the bigger |
| 709 | * page mapping attempt fails. |
Toshi Kani | 3d3ca41 | 2015-05-26 10:28:07 +0200 | [diff] [blame] | 710 | * |
| 711 | * Returns 1 on success and 0 on failure. |
| 712 | */ |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 713 | int pud_set_huge(pud_t *pud, phys_addr_t addr, pgprot_t prot) |
| 714 | { |
Toshi Kani | b73522e | 2015-05-26 10:28:10 +0200 | [diff] [blame] | 715 | u8 mtrr, uniform; |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 716 | |
Toshi Kani | b73522e | 2015-05-26 10:28:10 +0200 | [diff] [blame] | 717 | mtrr = mtrr_type_lookup(addr, addr + PUD_SIZE, &uniform); |
| 718 | if ((mtrr != MTRR_TYPE_INVALID) && (!uniform) && |
| 719 | (mtrr != MTRR_TYPE_WRBACK)) |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 720 | return 0; |
| 721 | |
Joerg Roedel | e3e2881 | 2018-04-11 17:24:38 +0200 | [diff] [blame] | 722 | /* Bail out if we are we on a populated non-leaf entry: */ |
| 723 | if (pud_present(*pud) && !pud_huge(*pud)) |
| 724 | return 0; |
| 725 | |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 726 | prot = pgprot_4k_2_large(prot); |
| 727 | |
| 728 | set_pte((pte_t *)pud, pfn_pte( |
| 729 | (u64)addr >> PAGE_SHIFT, |
| 730 | __pgprot(pgprot_val(prot) | _PAGE_PSE))); |
| 731 | |
| 732 | return 1; |
| 733 | } |
| 734 | |
Toshi Kani | 3d3ca41 | 2015-05-26 10:28:07 +0200 | [diff] [blame] | 735 | /** |
| 736 | * pmd_set_huge - setup kernel PMD mapping |
| 737 | * |
Toshi Kani | b73522e | 2015-05-26 10:28:10 +0200 | [diff] [blame] | 738 | * See text over pud_set_huge() above. |
Toshi Kani | 3d3ca41 | 2015-05-26 10:28:07 +0200 | [diff] [blame] | 739 | * |
| 740 | * Returns 1 on success and 0 on failure. |
| 741 | */ |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 742 | int pmd_set_huge(pmd_t *pmd, phys_addr_t addr, pgprot_t prot) |
| 743 | { |
Toshi Kani | b73522e | 2015-05-26 10:28:10 +0200 | [diff] [blame] | 744 | u8 mtrr, uniform; |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 745 | |
Toshi Kani | b73522e | 2015-05-26 10:28:10 +0200 | [diff] [blame] | 746 | mtrr = mtrr_type_lookup(addr, addr + PMD_SIZE, &uniform); |
| 747 | if ((mtrr != MTRR_TYPE_INVALID) && (!uniform) && |
| 748 | (mtrr != MTRR_TYPE_WRBACK)) { |
| 749 | pr_warn_once("%s: Cannot satisfy [mem %#010llx-%#010llx] with a huge-page mapping due to MTRR override.\n", |
| 750 | __func__, addr, addr + PMD_SIZE); |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 751 | return 0; |
Toshi Kani | b73522e | 2015-05-26 10:28:10 +0200 | [diff] [blame] | 752 | } |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 753 | |
Joerg Roedel | e3e2881 | 2018-04-11 17:24:38 +0200 | [diff] [blame] | 754 | /* Bail out if we are we on a populated non-leaf entry: */ |
| 755 | if (pmd_present(*pmd) && !pmd_huge(*pmd)) |
| 756 | return 0; |
| 757 | |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 758 | prot = pgprot_4k_2_large(prot); |
| 759 | |
| 760 | set_pte((pte_t *)pmd, pfn_pte( |
| 761 | (u64)addr >> PAGE_SHIFT, |
| 762 | __pgprot(pgprot_val(prot) | _PAGE_PSE))); |
| 763 | |
| 764 | return 1; |
| 765 | } |
| 766 | |
Toshi Kani | 3d3ca41 | 2015-05-26 10:28:07 +0200 | [diff] [blame] | 767 | /** |
| 768 | * pud_clear_huge - clear kernel PUD mapping when it is set |
| 769 | * |
| 770 | * Returns 1 on success and 0 on failure (no PUD map is found). |
| 771 | */ |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 772 | int pud_clear_huge(pud_t *pud) |
| 773 | { |
| 774 | if (pud_large(*pud)) { |
| 775 | pud_clear(pud); |
| 776 | return 1; |
| 777 | } |
| 778 | |
| 779 | return 0; |
| 780 | } |
| 781 | |
Toshi Kani | 3d3ca41 | 2015-05-26 10:28:07 +0200 | [diff] [blame] | 782 | /** |
| 783 | * pmd_clear_huge - clear kernel PMD mapping when it is set |
| 784 | * |
| 785 | * Returns 1 on success and 0 on failure (no PMD map is found). |
| 786 | */ |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 787 | int pmd_clear_huge(pmd_t *pmd) |
| 788 | { |
| 789 | if (pmd_large(*pmd)) { |
| 790 | pmd_clear(pmd); |
| 791 | return 1; |
| 792 | } |
| 793 | |
| 794 | return 0; |
| 795 | } |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 796 | |
Will Deacon | 8e2d434 | 2018-12-28 00:37:53 -0800 | [diff] [blame] | 797 | /* |
| 798 | * Until we support 512GB pages, skip them in the vmap area. |
| 799 | */ |
| 800 | int p4d_free_pud_page(p4d_t *p4d, unsigned long addr) |
| 801 | { |
| 802 | return 0; |
| 803 | } |
| 804 | |
Toshi Kani | f967db0 | 2018-06-27 08:13:46 -0600 | [diff] [blame] | 805 | #ifdef CONFIG_X86_64 |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 806 | /** |
| 807 | * pud_free_pmd_page - Clear pud entry and free pmd page. |
| 808 | * @pud: Pointer to a PUD. |
Chintan Pandya | 785a19f | 2018-06-27 08:13:47 -0600 | [diff] [blame] | 809 | * @addr: Virtual address associated with pud. |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 810 | * |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 811 | * Context: The pud range has been unmapped and TLB purged. |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 812 | * Return: 1 if clearing the entry succeeded. 0 otherwise. |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 813 | * |
| 814 | * NOTE: Callers must allow a single page allocation. |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 815 | */ |
Chintan Pandya | 785a19f | 2018-06-27 08:13:47 -0600 | [diff] [blame] | 816 | int pud_free_pmd_page(pud_t *pud, unsigned long addr) |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 817 | { |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 818 | pmd_t *pmd, *pmd_sv; |
| 819 | pte_t *pte; |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 820 | int i; |
| 821 | |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 822 | pmd = (pmd_t *)pud_page_vaddr(*pud); |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 823 | pmd_sv = (pmd_t *)__get_free_page(GFP_KERNEL); |
| 824 | if (!pmd_sv) |
| 825 | return 0; |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 826 | |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 827 | for (i = 0; i < PTRS_PER_PMD; i++) { |
| 828 | pmd_sv[i] = pmd[i]; |
| 829 | if (!pmd_none(pmd[i])) |
| 830 | pmd_clear(&pmd[i]); |
| 831 | } |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 832 | |
| 833 | pud_clear(pud); |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 834 | |
| 835 | /* INVLPG to clear all paging-structure caches */ |
| 836 | flush_tlb_kernel_range(addr, addr + PAGE_SIZE-1); |
| 837 | |
| 838 | for (i = 0; i < PTRS_PER_PMD; i++) { |
| 839 | if (!pmd_none(pmd_sv[i])) { |
| 840 | pte = (pte_t *)pmd_page_vaddr(pmd_sv[i]); |
| 841 | free_page((unsigned long)pte); |
| 842 | } |
| 843 | } |
| 844 | |
| 845 | free_page((unsigned long)pmd_sv); |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 846 | free_page((unsigned long)pmd); |
| 847 | |
| 848 | return 1; |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 849 | } |
| 850 | |
| 851 | /** |
| 852 | * pmd_free_pte_page - Clear pmd entry and free pte page. |
| 853 | * @pmd: Pointer to a PMD. |
Chintan Pandya | 785a19f | 2018-06-27 08:13:47 -0600 | [diff] [blame] | 854 | * @addr: Virtual address associated with pmd. |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 855 | * |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 856 | * Context: The pmd range has been unmapped and TLB purged. |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 857 | * Return: 1 if clearing the entry succeeded. 0 otherwise. |
| 858 | */ |
Chintan Pandya | 785a19f | 2018-06-27 08:13:47 -0600 | [diff] [blame] | 859 | int pmd_free_pte_page(pmd_t *pmd, unsigned long addr) |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 860 | { |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 861 | pte_t *pte; |
| 862 | |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 863 | pte = (pte_t *)pmd_page_vaddr(*pmd); |
| 864 | pmd_clear(pmd); |
Toshi Kani | 5e0fb5d | 2018-06-27 08:13:48 -0600 | [diff] [blame] | 865 | |
| 866 | /* INVLPG to clear all paging-structure caches */ |
| 867 | flush_tlb_kernel_range(addr, addr + PAGE_SIZE-1); |
| 868 | |
Toshi Kani | 28ee90f | 2018-03-22 16:17:24 -0700 | [diff] [blame] | 869 | free_page((unsigned long)pte); |
| 870 | |
| 871 | return 1; |
Toshi Kani | b6bdb75 | 2018-03-22 16:17:20 -0700 | [diff] [blame] | 872 | } |
Toshi Kani | f967db0 | 2018-06-27 08:13:46 -0600 | [diff] [blame] | 873 | |
| 874 | #else /* !CONFIG_X86_64 */ |
| 875 | |
Chintan Pandya | 785a19f | 2018-06-27 08:13:47 -0600 | [diff] [blame] | 876 | int pud_free_pmd_page(pud_t *pud, unsigned long addr) |
Toshi Kani | f967db0 | 2018-06-27 08:13:46 -0600 | [diff] [blame] | 877 | { |
| 878 | return pud_none(*pud); |
| 879 | } |
| 880 | |
| 881 | /* |
| 882 | * Disable free page handling on x86-PAE. This assures that ioremap() |
| 883 | * does not update sync'd pmd entries. See vmalloc_sync_one(). |
| 884 | */ |
Chintan Pandya | 785a19f | 2018-06-27 08:13:47 -0600 | [diff] [blame] | 885 | int pmd_free_pte_page(pmd_t *pmd, unsigned long addr) |
Toshi Kani | f967db0 | 2018-06-27 08:13:46 -0600 | [diff] [blame] | 886 | { |
| 887 | return pmd_none(*pmd); |
| 888 | } |
| 889 | |
| 890 | #endif /* CONFIG_X86_64 */ |
Toshi Kani | 6b63783 | 2015-04-14 15:47:32 -0700 | [diff] [blame] | 891 | #endif /* CONFIG_HAVE_ARCH_HUGE_VMAP */ |